blob: 5191472c4ba7773c1bd8eaefc611a23e068b6e8b [file] [log] [blame]
// Copyright Istio Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Package stsclient is for oauth token exchange integration.
package stsclient
import (
"bytes"
"encoding/json"
"fmt"
"io"
"net/http"
"time"
)
import (
"istio.io/pkg/env"
"istio.io/pkg/log"
)
import (
"github.com/apache/dubbo-go-pixiu/pkg/bootstrap/platform"
"github.com/apache/dubbo-go-pixiu/pkg/security"
"github.com/apache/dubbo-go-pixiu/security/pkg/monitoring"
)
var (
// GKEClusterURL is the URL to send requests to the token exchange service.
GKEClusterURL = env.RegisterStringVar("GKE_CLUSTER_URL", "", "The url of GKE cluster").Get()
// SecureTokenEndpoint is the Endpoint the STS client calls to.
SecureTokenEndpoint = "https://sts.googleapis.com/v1/token"
stsClientLog = log.RegisterScope("stsclient", "STS client debugging", 0)
)
const (
httpTimeout = time.Second * 5
contentType = "application/json"
Scope = "https://www.googleapis.com/auth/cloud-platform"
)
type federatedTokenResponse struct {
AccessToken string `json:"access_token"`
IssuedTokenType string `json:"issued_token_type"`
TokenType string `json:"token_type"`
ExpiresIn int64 `json:"expires_in"` // Expiration time in seconds
}
// SecureTokenServiceExchanger for google securetoken api interaction.
type SecureTokenServiceExchanger struct {
httpClient *http.Client
credFetcher security.CredFetcher
trustDomain string
backoff time.Duration
audience string
}
// NewSecureTokenServiceExchanger returns an instance of secure token service client plugin
func NewSecureTokenServiceExchanger(credFetcher security.CredFetcher, trustDomain string) (*SecureTokenServiceExchanger, error) {
aud, err := constructAudience(credFetcher, trustDomain)
if err != nil {
return nil, err
}
return &SecureTokenServiceExchanger{
httpClient: &http.Client{
Timeout: httpTimeout,
},
backoff: time.Millisecond * 50,
credFetcher: credFetcher,
trustDomain: trustDomain,
audience: aud,
}, nil
}
func retryable(code int) bool {
return code >= 500 &&
!(code == http.StatusNotImplemented ||
code == http.StatusHTTPVersionNotSupported ||
code == http.StatusNetworkAuthenticationRequired)
}
func (p *SecureTokenServiceExchanger) requestWithRetry(reqBytes []byte) ([]byte, error) {
attempts := 0
var lastError error
for attempts < 5 {
attempts++
req, err := http.NewRequest("POST", SecureTokenEndpoint, bytes.NewBuffer(reqBytes))
if err != nil {
return nil, err
}
req.Header.Set("Content-Type", contentType)
resp, err := p.httpClient.Do(req)
if err != nil {
lastError = err
stsClientLog.Errorf("token exchange request failed: %v", err)
time.Sleep(p.backoff)
monitoring.NumOutgoingRetries.With(monitoring.RequestType.Value(monitoring.TokenExchange)).Increment()
continue
}
if resp.StatusCode == http.StatusOK {
body, err := io.ReadAll(resp.Body)
resp.Body.Close()
return body, err
}
body, _ := io.ReadAll(resp.Body)
lastError = fmt.Errorf("token exchange request failed: status code %v body %v", resp.StatusCode, string(body))
resp.Body.Close()
if !retryable(resp.StatusCode) {
break
}
monitoring.NumOutgoingRetries.With(monitoring.RequestType.Value(monitoring.TokenExchange)).Increment()
if stsClientLog.DebugEnabled() {
stsClientLog.Debugf("token exchange request failed: status code %v, body %v", resp.StatusCode, string(body))
} else {
stsClientLog.Errorf("token exchange request failed: status code %v", resp.StatusCode)
}
time.Sleep(p.backoff)
}
return nil, fmt.Errorf("exchange failed all retries, last error: %v", lastError)
}
// ExchangeToken exchange oauth access token from trusted domain and k8s sa jwt.
func (p *SecureTokenServiceExchanger) ExchangeToken(k8sSAjwt string) (string, error) {
aud := p.audience
jsonStr, err := constructFederatedTokenRequest(aud, k8sSAjwt)
if err != nil {
return "", fmt.Errorf("failed to marshal federated token request: %v", err)
}
body, err := p.requestWithRetry(jsonStr)
if err != nil {
return "", fmt.Errorf("token exchange failed: %v, (aud: %s, STS endpoint: %s)", err, aud, SecureTokenEndpoint)
}
respData := &federatedTokenResponse{}
if err := json.Unmarshal(body, respData); err != nil {
// Normally the request should json - extremely hard to debug otherwise, not enough info in status/err
stsClientLog.Debugf("Unexpected unmarshal error, response was %s", string(body))
return "", fmt.Errorf("(aud: %s, STS endpoint: %s), failed to unmarshal response data of size %v: %v",
aud, SecureTokenEndpoint, len(body), err)
}
if respData.AccessToken == "" {
return "", fmt.Errorf(
"exchanged empty token (aud: %s, STS endpoint: %s), response: %v", aud, SecureTokenEndpoint, string(body))
}
return respData.AccessToken, nil
}
func constructAudience(credFetcher security.CredFetcher, trustDomain string) (string, error) {
provider := ""
if credFetcher != nil {
provider = credFetcher.GetIdentityProvider()
}
// For GKE, we do not register IdentityProvider explicitly. The provider name
// is GKEClusterURL by default.
if provider == "" {
if GKEClusterURL != "" {
provider = GKEClusterURL
} else if platform.IsGCP() {
if clusterURL, found := platform.NewGCP().Metadata()[platform.GCPClusterURL]; found && len(clusterURL) > 0 {
provider = clusterURL
stsClientLog.Infof("GKE_CLUSTER_URL is not set, fetched cluster URL from metadata server: %q", provider)
} else {
return "", fmt.Errorf("failed to get GCPClusterURL from Metadata(): found (%v), clusterURL (%v)",
found, clusterURL)
}
}
}
return fmt.Sprintf("identitynamespace:%s:%s", trustDomain, provider), nil
}
func constructFederatedTokenRequest(aud, jwt string) ([]byte, error) {
values := map[string]string{
"audience": aud,
"grantType": "urn:ietf:params:oauth:grant-type:token-exchange",
"requestedTokenType": "urn:ietf:params:oauth:token-type:access_token",
"subjectTokenType": "urn:ietf:params:oauth:token-type:jwt",
"subjectToken": jwt,
"scope": Scope,
}
jsonValue, err := json.Marshal(values)
return jsonValue, err
}